Avoiding connecting to unsecured Wi-Fi networks, such as public Wi-Fi hotspots;

Downloading apps from trusted sources, such as the Google Play Store and iOS App store, and not from unreliable third-party sources;

Being wary of unsolicited calls or messages; and

Mitigating mobile device attacks from penetrating the corporate environment, which provides the controls needed to secure, manage and monitor all the employe­e-owned mobile devices that access critical business data.